Главная
Study mode:
on
1
Intro
2
Fast facts about me...
3
Ask the Experts: What is threat modeling?
4
Threat Modeling for (Secure) Development
5
Threat Modeling for Individuals
6
Threat Modeling (for Devices and Users)
7
Below the OS: Pre-boot and Runtime
8
[Shark] Attack: "Advanced" Device-targeted TH
9
Persistent Threats in Firmware
10
Physical Access to User Devices
11
Supply Chain and Insider Threats
12
Sidebar: Supply Chain Complexity... Simplified
13
Building a Long-term Strategic Threat Model
14
Overview: "Below the OS" Mitigations Today
15
Potential Mitigations
16
Example Implementation: Dell SafeBIOS Frame RESPOND
Description:
Explore the evolving landscape of threat modeling in this 48-minute webcast from RSA Conference. Delve into the shift from nation-state conflicts to a more complex environment where everyone is vulnerable. Examine how modern threats extend beyond physical presence and supply chain to include firmware, necessitating advanced tools for prevention and detection. Discover below-the-OS mitigations designed to safeguard BIOS, firmware, and critical data. Learn about threat modeling for secure development, individuals, and devices. Investigate persistent firmware threats, physical access risks, and supply chain complexities. Gain insights into building long-term strategic threat models and implementing "below the OS" mitigations. Presented by Rick Martinez, Senior Distinguished Engineer for Client Solutions at Dell Technologies, this webcast offers a comprehensive overview of contemporary cybersecurity challenges and solutions.

My Threat Model is Your Threat Model

RSA Conference
Add to list
0:00 / 0:00